Drunken Warlock's repositories
blackbuntu
Official repository of the Blackbuntu pentesting distribution
LinuxCheatSheet
Linux Cheat Sheet
OnlyRAT
OnlyRAT is the only RAT you'll ever need. We will be able to use this tool to remotely command and control windows computers.Once installed we will have remote administrative access to our target that we can connect to through Python console on our attacker pc. The onlyrat console has plenty of payloads we can then use on our target.
AhMyth
Cross-Platform Android Remote Administration Tool | Powered by electron W/ added JDK 11 support | A revival of the original repository at https://GitHub.com/AhMyth/AhMyth-Android-RAT
AORT
All in One Recon Tool for Bug Bounty
AutoRecon
AutoRecon is a multi-threaded network reconnaissance tool which performs automated enumeration of services.
awesome-shodan-queries
🔍 A collection of interesting, funny, and depressing search queries to plug into shodan.io 👩💻
BruteSploit
BruteSploit is a collection of method for automated Generate, Bruteforce and Manipulation wordlist with interactive shell. That can be used during a penetration test to enumerate and maybe can be used in CTF for manipulation,combine,transform and permutation some words or file text :p
CheatSheetSeries
The OWASP Cheat Sheet Series was created to provide a concise collection of high value information on specific application security topics.
Complete-Python-3-Bootcamp
Course Files for Complete Python 3 Bootcamp Course on Udemy
HardwareAllTheThings
Hardware/IOT Pentesting Wiki
hoaxshell
A Windows reverse shell payload generator and handler that abuses the http(s) protocol to establish a beacon-like reverse shell.
mosint
An automated e-mail OSINT tool
PayloadsAllTheThings
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
psudohash
Password list generator that focuses on keywords mutated by commonly used password creation patterns
SSRFmap
Automatic SSRF fuzzer and exploitation tool
TheFatRat
N/A
Vegile
This tool will setting up your backdoor/rootkits when backdoor already setup it will be hidden your spesisifc process,unlimited your session in metasploit and transparent. Even when it killed, it will re-run again. There always be a procces which while run another process,So we can assume that this procces is unstopable like a Ghost in The Shell